A collection of nmap scripts I've written
☆23Mar 27, 2016Updated 9 years ago
Alternatives and similar repositories for Nmap-scripts
Users that are interested in Nmap-scripts are comparing it to the libraries listed below
Sorting:
- A powershell script that prints a lot of IP and connection info to the screen☆31Jan 25, 2017Updated 9 years ago
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆84May 9, 2014Updated 11 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- cobalt strike stuff I have gathered from around github☆31May 5, 2017Updated 8 years ago
- Nmap NSE scripts☆27Feb 1, 2022Updated 4 years ago
- ☆15Jun 14, 2017Updated 8 years ago
- nmapParser.py is a tool developed for consultants doing nmap scans against a large range of hosts. I found it easy to identify hosts that…☆13Jan 19, 2016Updated 10 years ago
- Basic examples for MITMf☆16Aug 28, 2015Updated 10 years ago
- z/OS Mainframe TPX panel account enumerator and brute forcer☆20Jan 10, 2018Updated 8 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆170Mar 7, 2018Updated 7 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- A phishing attack for Macs that copies the victim's password and keychain to the Public folder.☆45Dec 18, 2016Updated 9 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- ☆47Nov 18, 2015Updated 10 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Dec 11, 2015Updated 10 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- ☆43Sep 2, 2016Updated 9 years ago
- Parses Nmap XML files☆25Apr 29, 2015Updated 10 years ago
- ☆23Feb 16, 2016Updated 10 years ago
- Cobalt Strike Aggressor Scripts☆30Apr 15, 2017Updated 8 years ago
- NMAP scripts for TN3270 interaction as well as NJE. Most notably TSO User Enumeration and Brute Force. CICS transaction ID enumeration an…☆28Nov 9, 2016Updated 9 years ago
- Bash script to parse multiple Nmap (.gnmap) exports into various plain-text formats for easy analysis.☆66Mar 6, 2013Updated 12 years ago
- Ad free DNS server. A docker container with a DNS server configured to block advertisement hosts.☆28Sep 30, 2020Updated 5 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- Docker image for PowerShell remoting from Linux to Windows☆36Nov 21, 2018Updated 7 years ago
- A profesional hacking tool by Mr Juice☆12Oct 10, 2023Updated 2 years ago
- Massive arsenal of hacker tools...☆79Oct 30, 2017Updated 8 years ago
- The FOSS-Cloud webinterface.☆14Aug 25, 2017Updated 8 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆35Oct 17, 2019Updated 6 years ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆449May 25, 2022Updated 3 years ago
- SMB Auto authentication Vulnerability☆34Aug 1, 2016Updated 9 years ago
- Spray SMB with hashes, Then psexec☆32Jul 3, 2019Updated 6 years ago
- Simple, hand-picked list of fuzz strings☆34Nov 5, 2016Updated 9 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆76Nov 25, 2016Updated 9 years ago
- Python backdoor that uses http post/get requests to communicate☆42Aug 24, 2016Updated 9 years ago
- A tool designed for consistent and safe capture of off network web resources.☆39Mar 24, 2017Updated 8 years ago
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- Automatically parses and attacks BloodHound-generated graphs☆43Jul 16, 2018Updated 7 years ago
- ☆11Jul 19, 2020Updated 5 years ago